PEER-TO-PEER (P2P)applications have shown their popularity

Size: px
Start display at page:

Download "PEER-TO-PEER (P2P)applications have shown their popularity"

Transcription

1 954 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL 9, NO 7, JULY 2008 Free-Riding on BitTorrent-Like Peer-to-Peer File Sharing Systems: Modeling Analysis and Improvement Minglu Li, Jiadi Yu, and Jie Wu, Senior Member, IEEE Abstract BitTorrent has emerged as a very popular peer-to-peer file sharing system, which uses an embedded set of incentive mechanisms to encourage contribution and prevent free-riding However, BitTorrent s ability to prevent free-riding needs further study In this paper, we present a fluid model with two different classes of peers to capture the effect of free-riding on BitTorrent-like systems With the model, we find that BitTorrent s incentive mechanism is successful in preventing free-riding in a system without seeds but may not succeed in producing a disincentive for free-riding in a system with a high number of seeds The reason for this is that BitTorrent does not employ any effective mechanisms for seeds to effectively guard against free-riding Therefore, we propose a seed bandwidth allocation strategy for the BitTorrent system to reduce the effect of seeds on free-riding Finally, simulation results are given that validate what we have found in our analysis and demonstrate the effectiveness of the proposed strategy Index Terms Bandwidth allocation strategy, BitTorrent, free-riding, incentive mechanism, modeling Ç INTRODUCTION PEER-TO-PEER (P2P)applications have shown their popularity on the Internet for file sharing The P2P file sharing application allows users to distribute and obtain a file to be shared cooperatively However, most P2P collaborative systems that rely on voluntary contributions from individual participants potentially face the problem of free-riding Freeriding behavior has the negative effect of using up the service resources of a system while contributing nothing to the system Empirical studies [], [2], [3] have shown that most P2P systems consequently suffer from free-riding Cooperation is essential to a P2P file sharing system However, it is difficult to promote cooperation among all individual participants without an effective incentive mechanism BitTorrent [4] is a P2P file-distribution tool that has incentive mechanisms [5] to reduce free-riding and increase user cooperation Each peer can maximize its benefit within the constraints of the incentive mechanism The BitTorrent system is extremely popular and is accountable for 35 percent of all of the traffic on the Internet [6] In a BitTorrent system, a file to be shared is divided into multiple small pieces, and peers can serve other peers as soon as they have downloaded one piece of the file In the BitTorrent system, there are two types of peers: seeds and downloaders Seeds are peers who have all pieces of the file, whereas downloaders are peers who simultaneously download and upload pieces of the file with others BitTorrent M Li and J Yu are with the Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai , PR China {li-ml, jdyu}@cssjtueducn J Wu is with the Department of Computer Science and Engineering, Florida Atlantic University, Boca Raton, FL jie@csefauedu Manuscript received 22 Nov 2006; revised 23 June 2007; accepted 2 Sept 2007; published online 26 Sept 2007 Recommended for acceptance by C Shahabi For information on obtaining reprints of this article, please send to: tpds@computerorg, and reference IEEECS Log Number TPDS Digital Object Identifier no 009/TPDS employs the tit-for-tat peer selection strategy to prevent freeriding and promote fairness, where each peer uploads to a set of peers from which it has the highest downloading rates In addition to the tit-for-tat strategy, BitTorrent also incorporates an optimistic unchoking process to probe a new connection, where each peer randomly chooses a requesting peer to upload A distinguishing feature of BitTorrent is its policies for cooperation and preventing free-riding However, the effectiveness of these policies in reducing free-riding and unfairness has not yet been carefully examined under practical conditions Some studies, [7], [8], indicated that BitTorrent mechanisms cannot prevent free-riding and unfairness For example, Bharambe et al [7] indicated that some peers uploaded 626 times as many pieces as they downloaded in BitTorrent Jun and Ahamad [8] showed that low-bandwidth peers complete downloads in about the same amount of time as high bandwidth peers in BitTorrent However, they did not analyze whether there was a reduction in free-riding in BitTorrent systems In [9], Qiu and Srikant briefly discussed the effect of optimistic unchoking on free-riding and found that optimistic unchoking can induce free-riding However, they failed to analyze the impact on free-riding that optimistic unchoking has in the BitTorrent system In this paper, we study the level of free-riding on BitTorrent-like P2P file sharing systems and the effect of free-riding on the performance of the BitTorrent system through a fluid model with two different classes of peers Our contributions in this paper can be summarized as follows: We develop a fluid model with two different classes of peers (non-free-riders and free-riders) to capture the effect of free-riding on a BitTorrent system With the model, we find that although optimistic unchoking may induce free-riding, free-riders do not impose a major impact through optimistic unchoking on the performance of the BitTorrent system BitTorrent s /08/$2500 ß 2008 IEEE Published by the IEEE Computer Society

2 LI ET AL: FREE-RIDING ON BITTORRENT-LIKE PEER-TO-PEER FILE SHARING SYSTEMS: MODELING ANALYSIS AND IMPROVEMENT 955 incentive mechanism could prevent free-riding effectively in a system without seeds Applying the fluid model with two classes of peers, we study the effect of seeds on free-riding It is seen that BitTorrent mechanisms may fail in preventing free-riding in a system having a large number of seeds This is because free-riders can benefit significantly from seeds, and BitTorrent does not provide an effective policy for seeds to guard against free-riding A seed bandwidth allocation strategy based strictly on the uploading rate of peers in the BitTorrent system is proposed We prove that there exists a Nash equilibrium point with this strategy, under which each peer achieves its maximum uploading bandwidth From the results of the simulation, we find that this allocation strategy not only penalizes free-riding but also quite effectively improves the performance of contributors The remainder of this paper is organized as follows: In Section 2, related works on free-riding and BitTorrent file sharing systems are surveyed Section 3 provides a brief introduction for the BitTorrent system and its preliminaries In Section 4, we analyze the incentive mechanism of BitTorrent In Section 5, a fluid model with two classes of peers is presented to recapitulate the effect of free-riding on a BitTorrent system A seed bandwidth allocation strategy is proposed in Section 6 In Section 7, simulation results are presented Finally, we conclude this paper in Section 8 focuses on parallel downloads in the case of a symmetric access link, and that in [24] studies static resource allocation for service differentiation and bandwidth diversity, which have significant differences with our work We propose a fluid model with two classes of peers (free-riders and nonfree-riders) to study free-riding behavior on BitTorrent-like networks Our model studies the dynamic resource allocation, where the resource assignment criteria depend completely on BitTorrent mechanisms Several analytical studies of BitTorrent s incentive mechanisms are presented in [7], [8], [9], and [22] In [7], it is found that BitTorrent mechanisms cannot prevent a systematical fairness through a set of simulations Jun and Ahamad [8] provide a game-theoretic framework to explore BitTorrent s incentive mechanism They show that freeriders are not punished properly, and contributors are not rewarded appropriately Qiu and Srikant [9] prove that a Nash equilibrium point exists with the tit-for-tat strategy, under which each peer will upload at its maximum uploading bandwidth Tian et al [22] find that the original tit-for-tat strategy cannot improve file availability, and an innovative tit-for-tat strategy is proposed However, the capability of BitTorrent in preventing freeriding is still not fully studied Our work differs from the above studies in that we analyze the level of free-riding found in BitTorrent systems and the impact of free-riding on the performance of the BitTorrent system through a fluid model and determine the effect of seeds on free-riding within a BitTorrent system 2 RELATED WORK P2P systems, as collaborative computing systems, inevitably confront the problem of free-riding Empirical studies [], [3] have shown prevalent free-riding in P2P file sharing systems Research has been conducted to study free-riding on P2P file sharing systems [0], [], [2] Several existing P2P systems have some mechanisms built-in to encourage information sharing For example, KaZaA [3] considers the participation level, which is calculated as the ratio between a peer s recent uploads and downloads emule [4] establishes a credit system where credits are exchanged between two specific nodes BitTorrent systems, however, are built with information sharing as one of the main objectives Some studies have been performed on the measurement and modeling of BitTorrent-like networks Many measurement studies [7], [5], [6], [7], [8] based on real-world applications and simulations for BitTorrent show that the BitTorrent system has very good properties to support a large number of downloaders In order to understand the performance of the P2P file sharing system and BitTorrent system, many models have been presented Ge et al [9] and Ramachandran and Sikdar [20] present an analytic framework to study the P2P file sharing system In [2], Yang and de Veciana discuss a branching process for studying the transient regime of the BitTorrent system and propose a Markov chain model Qiu and Srikant [9] present a simple fluid model based on the Markov chain model proposed in [2] to describe the dynamics of the BitTorrent system In [22], a simple mathematical model is developed, which models the behaviors of peers differently according to the state they are in In [23] and [24], a multiclass fluid model of BitTorrent-like networks based on [9] is proposed, somewhat similar to the model discussed here The work in [23] 3 PRELIMINARIES BitTorrent is a P2P application that aims to enable fast and efficient distribution and downloading of large files The basidea in BitTorrent is to break down a shared file into equal-sized segments (typically 256 Kbytes), which are called pieces A peer can download different pieces concurrently from multiple peers while uploading various pieces to other peers In a BitTorrent system, the sharing file provider creates a metafile called a torrent file, which contains the metainformation, for example, the piece size and IP address of the socalled tracker, and then puts the file on a Web server There are three components in the system: trackers, seeds, and downloaders The tracker is a central server, which keeps track of all peers currently in the system and collects statistics to help peers find each other to exchange the file pieces All peers in the system, including seeds and downloaders, self-organize into a P2P network, which is known as a torrent To download a file, peers download a torrent file from a Web server to access the tracker and join the system The peer asks the tracker for a list of other peers so that it can build up its peer set The tracker then returns a random list of peers (which typically consists of 50 peers) This peer will establish connection directly to peers in the peer set, which become its neighbors In the peer set, each peer knows the distribution of the various pieces for each peer All the peers in the torrent will periodically report their progress to the tracker Each peer looks for opportunities to download pieces from and upload pieces to its neighbors in its peer set It chooses the pieces that are rarest among its neighbors in a local rarest first policy in order to maximize the diversity of content in the system BitTorrent attempts to induce fairness and guard against free-riding through a tit-for-tat policy Under the tit-for-tat

3 956 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL 9, NO 7, JULY 2008 policy, each peer uploads to a fixed number of other peers (the default being four) from which it could download at the highest downloading rate for a given time The corresponding algorithm is called the choking algorithm A refusal to upload to a neighbor is called choking, and the connections to the chosen neighbors are unchoked Every 0 seconds, a peer recalculates the download rate (a rolling 20-second average) that it is receiving from its neighbor to decide who it wants to choke and who it wants to unchoke It then leaves the situation as is until the next 0-second period is up However, the seeds do not play by this strategy, because they are done downloading and no longer have useful download rates to decide which peers to upload to For a seed, it will simply choose download peers to upload, which is called upload only In addition to this peer selection policy, BitTorrent also incorporates an optimistic unchoking policy The optimistic unchoking policies are further detailed in Section 4 In [9], a fluid model, which is based on the Markov chain approach in [2], was developed for BitTorrent-like file sharing systems The model assumes that all peers are homogeneous, with all peers having the same upload and download capacity There are two states in the system: the download state and the seed state Qiu and Srikant [9] use a Markovian description of the system in relation to the two states to develop the fluid model The model is presented in [9], where the expressions of the numbers of downloaders and seeds and the average download time could be obtained as functions of the parameters as the peer arrival/leave rate and the upload/download rate, etc The model gives insight as to how the average download time and the network performance of a BitTorrent-like system is affected by different parameters The analysis proves that BitTorrent achieves very good scalability However, the model in [9] focused only on obtaining performance indexes for homogeneous peers In practical applications, BitTorrent confronts the problem of free-riding, in which free-riders occupy service resources while contributing nothing In order to capture the effect of free-riding on a BitTorrent system, we introduce a free-riding class of peers into the fluid model in [9] that only takes into account one class of peers with equal service capacity Our model takes into account two different classes of peers: one provides service capacity, and the other contributes nothing to the system Furthermore, we adopt dynamic resource allocation to two different classes of peers, where the resource assignment criteria depend completely on BitTorrent s mechanisms another peer that has a better downloading rate than the ones currently downloading, and the newcomer (who has no share yet) can get bootstrapped by downloading the first piece However, the random selection of optimistic unchoking provides an opportunity for free-riders to download the file For example, free-riders can get a downloading rate through optimistic unchoking We need to analyze the effect of optimistic unchoking on free-riding Let Gfp 0 ;p ; ;p xn ;q 0 ;q ; ;q xf g be a set of peers in a BitTorrent system, where x n is the number of non-freeriders, and x f is the number of free-riders We assume all non-free-riders have the same uploading bandwidth, and there are no seeds in G Let be the uploading bandwidth of a non-free-rider The total uploading rate of the system can be expressed as x n Let u be the number of uploading connections of a non-free-rider, one of which is an optimistic unchoking uploading connection The downloading rate of a connection is limited to u According to optimistic unchoking, each non-free-rider randomly selects a peer to upload regardless of its downloading rate Consequently, the total expected downloading rate of free-riders in G is E½D f Š¼ Xxn ¼ Cx k n k¼0 x k f x n u x n þ x f u x n þ x f u x nx f x n þ x f u x n x f x n þ x f u u xn k k u when x n þ x f u We can see in () that free-riders can still x get the downloading rate of n x f x n þx f u despite the fact that they have nothing to contribute to the system Let be the ratio of the total downloading rate of free-riders to the total uploading rate of non-free-riders We have ¼ E½D fš ¼ x n u x f ; ð2þ x n þ x f where 2½0; Š We can see in (2) that free-riders may obtain a fraction of the total downloading rate of the system From the above analysis, we find that current BitTorrent mechanisms fail to completely eliminate free-riding, and freeriders can get service resources provided by non-free-riders through optimistic unchoking Motivated by this observation, we first analyze the impact of free-riding to a BitTorrent system through a fluid model with two different classes of peers ðþ 4 MECHANISM ANALYSIS BitTorrent peers utilize a tit-for-tat strategy to select the upload/download peers: Each peer uploads to a set of peers that provide it with the highest downloading rates This mechanism is employed to encourage the user to upload and guard against free-riding In [9], it has been proved by the game theory that there exists a Nash equilibrium point with the tit-for-tat strategy under which each peer will upload at its maximum uploading bandwidth BitTorrent also adopts a strategy called optimistic unchoking In optimistic unchoking, each peer randomly chooses a requesting downloader to upload regardless of its downloading rate, in addition to maintaining connections with those peers selected by the choking algorithm The purpose of optimistic unchoking is that a peer could upload to 5 MODELING AND ANALYSIS Our model is an extension of the model in [9] In our model, download peers are divided into two classes in a BitTorrent system: non-free-riders and free-riders Non-free-riders can provide equal service capacity, whereas free-riders contribute nothing to the BitTorrent system In addition, seeds also provide equal service capacity to the system We assume that free-riders will depart from the system immediately after they have finished their download and have all the pieces of the sharing file, because they do not provide any service resources to others even if they were to stay in the system Therefore, there are three states in the system: the non-freerider download state, the free-rider download state, and the seed state We can obtain a Markovian description of the system in relation to the three states

4 LI ET AL: FREE-RIDING ON BITTORRENT-LIKE PEER-TO-PEER FILE SHARING SYSTEMS: MODELING ANALYSIS AND IMPROVEMENT 957 TABLE Notations and Model Parameters It is realistic that the uploading bandwidth of a host is less than its downloading bandwidth, which is consistent with the current access technologies 5 Modeling A glossary of the model notations and parameters is listed in Table Fig shows a general model of three states (the nonfree-rider download state, the free-rider download state, and the seed state), the rate at which users flow into and flow out of the three states, and the fraction of allocated bandwidth of users in the three states on a BitTorrent file sharing system In our model, the arrival process of the new non-free-rider and free-rider is modeled as a Poisson process with an arrival rate of n and f, respectively, that is, new non-freeriders and free-riders flow into the non-free-rider download state and the free-rider download state, respectively, with the rate n and f The parameter is used to indicate the efficiency of the file sharing, and it has been proved to be close to in [9] The efficiency of the file sharing of freeriders is equal to 0 At time t, the total uploading rate of the Fig General model of the three states on a BitTorrent file sharing system system is ðx n ðtþþyðtþþ All non-free-riders and free-riders share the total uploading bandwidth provided by the nonfree-riders and seeds ðtþ gives a non-free-rider uploading bandwidth assignment criterion for free-riders Applying the expression of (2), we have ðtþ ¼ u x f ðtþ x n ðtþþx f ðtþ ; ð3þ where ðtþ 2½0; Š A seed will uniformly assign its uploading bandwidth to every downloader no matter if it is the free-rider or not Hence, the seed uploading bandwidth assignment criterion for free-riders is x f ðtþ ðtþ ¼ x n ðtþþx f ðtþ ; ð4þ where ðtþ 2½0; Š Therefore, the total downloading rate of non-free-riders is ½ð ðtþþx n ðtþþð ðtþþyðtþš, and the total downloading rate of free-riders is ½ðtÞx n ðtþþðtþyðtþš The total downloading rate of non-free-riders and free-riders cannot exceed cx n ðtþ and cx f ðtþ, respectively, so we have D n ðtþ ¼minfcx n ðtþ;ð ðtþþx n ðtþþð ðtþþyðtþg; D f ðtþ ¼minfcx f ðtþ;ðtþx n ðtþþðtþyðtþg; ð5þ where D n ðtþ and D f ðtþ denote the total downloading rate of non-free-riders and free-riders, respectively, at time t, that is, the rate at which non-free-riders and free-riders flow out of the non-free-rider download state and the free-rider download state, respectively, after they have finished their download x n ðtþ and x f ðtþ are the rate at which non-freeriders and free-riders depart from the non-free-rider

5 958 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL 9, NO 7, JULY 2008 download state and the free-rider download state, respectively, without having downloaded the entire file The nonfree-rider will flow into the seed state with the rate D n ðtþ after they have downloaded the sharing file completely Seeds leave the system according to an exponential distribution with the rate Hence, the rate of change of the number of non-free-riders, free-riders, and seeds is given by the following equations: dx n ðtþ ¼ n x n ðtþ D n ðtþ; dt dx f ðtþ ¼ f x f ðtþ D f ðtþ; dt dyðtþ ¼ D n ðtþ yðtþ: dt These (6) define a simple description of the evolution for the three states of the system dynamics 52 Steady-State Performance Analysis and Discussion To study the steady-state system performance, we assume that lim t! x n ðtþ, lim t! x f ðtþ and lim t! yðtþ exist, that is lim x nðtþ ¼x n ; lim x f ðtþ ¼x f ; lim yðtþ ¼y; t! t! t! where x n, x f, and y are the equilibrium values of x n ðtþ, x f ðtþ, and yðtþ, respectively Under the steady state t!, we have dx n ðtþ dt ¼ dx fðtþ dt ¼ dyðtþ dt ¼ 0: To simplify the model, we assume that the download peer will never abort the system ð ¼ 0Þ We first examine the situation when the download peer will leave the system immediately upon completing the sharing-file download ð!þ, that is, there are no seeds to provide uploading bandwidth in the system We are interested in the worst situation, where peers are not willing to cooperate and provide more service capacity Hence, the steady-state equations are given by 0 ¼ n minfcx n ;ð Þx n Þg; ð7þ 0 ¼ f minfcx f ;x n g; where ¼ x f ; ð8þ u x n þ x f where is the equilibrium value of ðtþ, and 2½0; Š Theorem When c and x n ;x f 2½0; þþ, we have cx n 6<ð Þx n, and cx f 6<x n Proof If cx n <ð Þx n, we have c<ð Þ because x n is nonnegative It is easy to see that c<ð Þ < because 0 ð Þ and 0, which contradict with c If cx f <x n, we have c< x n u x nþx f because ¼ x f u x n þx f It is easy to see that c< x n u x n þx f <because 0 xf x n þx f and u, which contradict with c Therefore, Theorem is true tu ð6þ The implication of Theorem is that the downloading rate is not a bottleneck for either non-free-riders or freeriders when the uploading bandwidth of a peer is less than its downloading bandwidth ðc Þ In other words, there is no constraint on the downloading rate in a realistic situation Solving (7) under the condition that cx n ð Þx n and cx f x n, we obtain x n ¼ n ; x f ¼ f u ; ð9þ where ¼ f nþ f, and u > In (9), we see that (7) has a unique solution, and there exists an equilibrium point (x n ; x f ) However, if u <, the value of x f is negative, which does not exist in a realistic situation, that is, the freerider does not have an equilibrium value, and lim t! x f ðtþ does not exist Hence, we consider that u is the threshold value of, where the equilibrium value of free-riders exists Theorem 2 Let T n and T f be the average download time of nonfree-riders and free-riders, respectively, and T be the average download time of the system When there are no seeds in the system, we have the following results: " # T n ¼ ; T f ¼ u ; T ¼ þ u : ð0þ Proof In [9], Little s law [25] was used to evaluate the average download time for a peer in the steady state as x x ¼ð xþt (T is the average download time) Similarly, in our model, the average download time of non-free-riders and free-riders in the system is given respectively by T n ¼ x n n and T f ¼ x f f The probability that a peer who just completed its download job is a freerider is, and the probability that it is a non-free-riding peer is ð Þ Therefore, the average download time of the system is given by T ¼ð ÞT n þ T f Based on the expression of (8) and (9), the results of Theorem 2 can be easily derived tu The model coupled with an efficient method provides us with the ability to explore the performance of the system and capture the effect of free-riding on a BitTorrent system Fig 2a plots the average download time of non-free-riders, freeriders, and a system with varying values of, given that the number of uploading connections of a peer u is 5 In Fig 2a, we find that the average download time of free-riders T f is always larger than the average download time of non-freeriders T n, and there is a sharp increase in T f with increasing T n also increases, but it is not dramatic, and there is little change when is not very large In addition, when 0:2, that is, u, the average download time of free-riders does not exist because some free-riders cannot finish their download job This is because with an increasing, there will be fewer peers to contribute service resources so that free-riders cannot get enough service resources to download the entire file However, non-free-riders can always get enough service resources to finish its download job, except at ¼ Itis shown that BitTorrent mechanisms are capable of guarding against free-riding effectively in a system without seeds, and

6 LI ET AL: FREE-RIDING ON BITTORRENT-LIKE PEER-TO-PEER FILE SHARING SYSTEMS: MODELING ANALYSIS AND IMPROVEMENT 959 Fig 2 (a) The average download time of non-free-riders, free-riders, and a system with varying (b) For different the values of u, the average download time of the non-free-rider with varying values of free-riders do not impose a major impact through optimistic unchoking on the performance of non-free-riders Fig 2b plots the average download time of free-riders with varying values of when u is given a value of, 2, 5, or 0 From the figure, we find that as u increases, the average download time of free-riders increases as well, and the threshold value of decreases When u ¼, non-freeriders and free-riders can gain the same service resources All free-riders can finish their download job the same as non-free-riders However, as u increases, service resources that free-riders can gain will decrease sharply, so that it is more and more difficult for free-riders to finish their download job For example, the value of has to be less than 0 when the value of u is 0 Therefore, it is easily seen that increasing u can better guard against free-riding However, the large number of uploading connections of a peer will lead to more time-outs and result in poor performance because multiple TCP connections have to share the same bandwidth [9] In a BitTorrent system, the value of u is set to 5, which not only better guards against free-riding but also avoids more time-outs and poor performance, a result of multiple TCP connections We have previously assumed that! However, in practical applications, many peers are likely to stay in the system after they have completed their download and act as a seed to serve others Hence, free-riders can get the downloading rate from seeds to finish the download job even if BitTorrent mechanisms can prevent them completely from getting service resources from other downloaders Based on this consideration, we will now discuss the effect of free-riding when parameters should be introduced To simplify the model, we assume that each peer has a limited upload capacity, and network capacity is assumed to be unconstrained, that is, c ¼[2] Hence, the steady-state equations are given by where and are the equilibrium values of ðtþ and ðtþ, respectively, and ; 2½0; Š Solving (), we obtain 2 3 x n ¼ n ; x f ¼ f 4 ð Þ 5; y ¼ n ð2þ when > We set c ¼ previously However, if the seed-leaving rate is smaller than, then downloading bandwidth c will determine the network performance even though c may be very large [9] Hence, we have x n ¼ n c ; x f ¼ f c ð3þ when The system has an equilibrium point (x n, x f, y) If < u, the free-rider does not have an equilibrium u þ value, that is, lim t! x f ðtþ does not exist Theorem 3 Let T n and T f be the average download time of nonfree-riders and free-riders, respectively, in a BitTorrent system with seeds We have the following results: when > ; T n ¼ ; 2 3 T f ¼ ð4þ 4 ð u Þ 5; when ; T n ¼ c ; T f ¼ c : ð5þ Proof See proof of Theorem 2 tu where 0 ¼ n ½ð Þx n þ ð ÞyŠ; 0 ¼ f ðx n þ yþ; 0 ¼½ð Þx n þ ð ÞyŠ y; ¼ x f ; ¼ x f ; u x n þ x f x n þ x f ðþ We know that when the departure rate of seeds decreases, the number of seeds will increase in the system, and more service resources are provided to downloaders In Fig 3a, we plot the ratio of the average download time of non-free-riders and free-riders with varying departure rate of seeds, given that the number of uploading connections of a peer u is 5 We observe that the ratio between T n and T f will increase when the departure rate of seeds decreases When decreases to, free-riders and non-free-riders

7 960 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL 9, NO 7, JULY 2008 Fig 3 (a) The ratio between the average download time of non-free-riders and free-riders as the departure rate of seeds varies (b) The threshold value of as the departure rate of seeds varies have the same average download time (the average download time is determined by downloading bandwidth c) As decreases, free-riders may get more service resources from seeds and download faster, whereas non-free-riders will get less service resources from seeds and download slower It is shown that BitTorrent mechanisms may not succeed in producing a disincentive for free-riding in a system having a large number of seeds, and free-riders can get a great deal of benefit from seeds In addition, when increases, the ratio between T n and T f will decrease because the average download time of free-riders will increase just like in the system without seeds Fig 3b plots the threshold value of as the departure rate of seeds varies As in a no-seed system, when is increased to a threshold value, the free-rider cannot download the sharing file completely In Fig 3b, we find that the threshold value of will increase as the departure rate of seeds reduces It is shown that when there is a greater number of seeds, it is more helpful to free-riders to download the sharing file From the above modeling analysis, in a BitTorrent system, although optimistic unchoking can potentially result in unfairness and induce free-riding, free-riders can only obtain a few service resources under optimistic unchoking However, the majority of service resources for free-riders is from seeds The tit-for-tat strategy does not adapt to seeds, and there is no policy to guard against freeriding Seeds will uniformly assign their resources to every downloader Although seeds are volunteered to serve others whether they are free-riders or not, the potential for directly harming non-free-riders if free-riders occupy many service resources provided by seeds still exists, which is unfair to non-free-riders In [26], the authors developed a scenario that the free-riders can completely ignore downloaders and only attempt to connect and download pieces from seeds by modifying an existing BitTorrent client Motivated by this observation, we believe it is important for the system to establish an effective mechanism to prevent free-riders from getting more service resources from seeds 6 PROPOSED BITTORRENT MODIFICATION In this section, we propose a seed bandwidth allocation strategy, where seeds provide service differentiation based on the contribution of individual peers Our strategy target is that a downloader that provides more service to the system will be granted a higher benefit than downloaders that provide less service when some downloaders asks for a downloading file from a seed To provide an incentive, the seed bandwidth allocation strategy takes into account the contribution of downloaders We define the uploading rate of downloaders as the contribution of the downloader Decisions to allocate the bandwidth of seeds are based strictly on the current uploading rate of downloaders When some downloaders attempt to establish connections to a seed for downloading the file, the seed retrieves the uploading rate (a rolling 20-second average uploading rate) of every requesting downloader from neighbors of downloaders though a tracker that maintains the information of neighbors of downloaders and then allocates its uploading bandwidth to requesting downloaders based on their uploading rate Like BitTorrent s choking algorithm, each seed reallocates its uploading bandwidth every 0 seconds To ensure the trustworthiness of feedback from neighbors of downloaders, we assume that there is a reputation mechanism in the BitTorrent system to monitor peers, such as DRBTS [27] or EigenTrust [28] Therefore, each peer is truthful in reporting, and there is no collusion among peers This way, no issue of false praise (overreporting) or badmouthing (underreporting) will occur, and the neighbors will accurately report the behavior of their peers In the remainder of this section, we discuss how a seed implements a mechanism to distribute its uploading bandwidth among all its requesting downloaders Note that the network capacity is assumed to be unconstrained, that is, there are no constraints on the downloading bandwidth 6 Allocation Mechanism We begin with N downloaders requesting a seed with fixed upload bandwidth Let W be the uploading bandwidth of the seed Downloaders that request a file download from the seed are denoted as N ;N 2 ; ;N N, where N is the number of requesting downloaders The uploading bandwidth W of the seed is allocated depending on the contribution of requesting downloaders We assume that is the contribution value of the requesting downloader N i Then, c ¼½c c N Š represents all contribution values of requesting downloaders If 2<, then s a vector of N elements Fig 4 shows the framework of the seed bandwidth allocation

8 LI ET AL: FREE-RIDING ON BITTORRENT-LIKE PEER-TO-PEER FILE SHARING SYSTEMS: MODELING ANALYSIS AND IMPROVEMENT 96 Theorem 4 There exists the unique optimal solution x ¼ ½x ;x 2 ; ;x NŠ to solve the following optimization problem: max s:t: X N i¼ X N i¼ logð þ x i Þ x i ¼ W i ¼ ; 2; ;N: ð8þ Proof For all i, i ¼ ; 2; ;N, we have Fig 4 Framework of the seed bandwidth 2 U 2 2 U j ¼ 0 ¼ ð þ x i Þ 2 < 0 i ¼ ; 2; ;N; i; j ¼ ; 2; ;N: Let x i ðx i 0Þ denote the uploading bandwidth of the seed allocated to the downloader N i, and then, x ¼½x x N Š is a vector of the bandwidth allocation for all N requesting downloaders In our design, we want our allocation to be proportionally fair by the contribution value c, that is, a downloader receives a downloading rate from the seed in proportion to its own uploading rate to the system This holds if for any other bandwidth allocation vector x 0, the aggregate of the weighted proportional changes is zero or negative [29]: X N i¼ x 0 i x i x i 0 i ¼ ; 2; ;N; where P N i¼ x i ¼ W, and denotes the weights, that is, the contribution values We assume that each downloader has a utility function, which represents the degree of satisfaction for receiving a certain allocated uploading bandwidth Let U i ðx i Þ be the utility of the downloader N i, given an uploading bandwidth allocation x i The utility may be a characterization of the estimated performance as a function of a given uploading bandwidth We make the following assumption regarding U i : For all i 2f; 2; ;Ng, the utility function U i ðx i Þ is continuously differentiable, monotonically increasing ðui 0ðx iþ > 0Þ, and concave ðui 00ðx iþ0þ Given complete knowledge, the objective for the seed bandwidth allocation can be solved as follows: max s:t: X N i¼ X N i¼ U i ðx i Þ x i ¼ W i ¼ ; 2; ;N: ð6þ An optimal solution x ¼½x ;x 2 ; ;x NŠ exists for (6), because the objective function P N i¼ U iðx i Þ is continuous, strictly increasing, and concave The utility function that we have chosen for downloader N i is U i ðx i Þ¼ logð þ x i Þ; ð7þ which satisfies our assumption and closely resembles the utility function of proportionally fair allocation in [29] but has U i ð0þ ¼0 The Hessian matrix of the utility function U i is 2 @x 2 2 U 2 U ru 2 U i ¼ 2 N B 2 U 2 U N 2 U 2 N 0 ci 0 0 ðþx Þ ðþx 2 Þ 2 ¼ : B A 0 0 ðþx N Þ 2 It is now easy to see that rui 2 is negative definite, and thus, U i is strictly concave Therefore, the optimization problem (8) allows a unique optimal solution We have the following Lagrangian function:! Lðx; Þ ¼ XN logð þ x i Þ XN x i W ; i¼ where is the Lagrangian i ð þ x i Þ ¼ XN x i i¼ W ¼ 0: i¼ i ¼ ; 2; ;N; There exists a nonnegative Lagrangian multiplier such that the above conditions are satisfied: ¼ ð þ x i Þ i ¼ ; 2; ;N: When x i 0, i ¼ ; 2; ;N, it follows that ð þ x i Þ ¼ c j ð þ x j Þ This can be rewritten as ð þ x j Þ ð þ x i Þ ¼ c j i; j ¼ ; 2; ;N: i; j ¼ ; 2; ;N:

9 962 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL 9, NO 7, JULY 2008 To determine the bandwidth allocation strategy, we have X N k¼ ð þ x k Þ ð þ x i Þ ¼ XN P N c k k¼ k¼ c k ; that is; P N k¼ ð þ x i Þ ¼ ð þ x k Þ P N k¼ and then, x i can be expressed as! x i ¼ c X i N x k þ N ¼ ðw þ NÞ : k¼ c k x i P N k¼ c k ; ð9þ ði ¼ ; 2; ;NÞ is the unique optimal solution of the optimization problem (8) tu Equation (9) provides a bandwidth allocation policy of the seed among all requesting downloaders In (9), since x i 0, we note that should not be too small and far from the average contribution value The downloader who provides a smaller contribution value will be dropped If 9x i < 0, i 2f; 2; ;Ng, the requesting downloader N i will be dropped, and then, the seed reallocates its uploading bandwidth to other requesting downloaders except N i This step will be repeated until all allocated uploading bandwidths are not smaller than zero, that is, x i 0, i ¼ ; 2; ;N The seed bandwidth allocation policy Instance: All requesting downloaders set N ¼fN ; N 2 ; ;N N g, the contribution value set c ¼½c c N Š, and the bandwidth allocation set x ¼½x x N Š The seed retrieves the uploading rate c of every requesting downloader N i ;N i 2 N from the neighbors of downloaders 2 The seed assigns its uploading bandwidth W to the requesting downloader N i ; 8N i 2 N according to the (9) and gets x i ;x i 2 x 3 If 9x i < 0, x i 2 x, then N ¼ N N i, and x i ¼ 0 4 Repeat step 2 until 8x i 0;x i 2 x Note that the requesting downloader whose contribution value is zero (that is, contributes nothing to the system) will be dropped for certain and cannot obtain any downloading rate from the seed Thus, the contribution value of downloaders must be larger than zero (at least) in order to obtain a downloading rate from the seed, that is, > 0 Theorem 5 For any two requesting downloaders N i, N j ði; j 2f; 2; ;NgÞ, we have if c j ; then U i ðx i ÞU j ðx j Þ: Proof According to (9), if c j, then x i x j Therefore, ðþx i Þðþx j Þ)logðþx i Þlogðþx j Þ) logðþx i Þ c j logð þ x j Þ)U i ðx i ÞU j ðx j Þ tu In Theorem 5, we know that the seed bandwidth allocation policy provides a higher utility for requesting downloaders who have the higher uploading rate Therefore, our allocation policy provides an incentive in the BitTorrent system 62 Nash Equilibrium We now consider whether all requesting downloaders are satisfied under our seed bandwidth allocation policy In the game theory, this is determined by seeing whether there exists a Nash equilibrium c ¼½c ;c 2 ; ;c N Š, where c > 0 At the Nash equilibrium, no single downloader wishes to deviate from its contribution value or has an incentive to change its strategy because the contribution value of each requesting downloader is the best response to the contribution value of other requesting downloaders We adopt the notation c i to denote the vector of all requesting downloaders other than, that is, c i ¼½c ;c 2 ; ; ;þ ; ;c N Š Suppose that all requesting downloaders have the same physical uploading bandwidth (that is, maximum uploading bandwidth), and then, 2½0;Š; 8i 2f; 2; ;Ng A Nash equilibrium of a game defined by ðu ;U 2 ; ;U N Þ for all requesting downloaders N i is U i ðc i ; c i ÞU ið ; c i Þ; where 2½0;Š, i ¼ ; 2; ;N, and c i > 0 Because the utility function U i ðx i Þ is continuously differentiable, monotonically increasing, and concave, every requesting downloader s optimal response is captured in its bandwidth allocation function x i ðcþ, that is, (9) Therefore, we can use x i ðcþ as a tool to evaluate the existence of a Nash equilibrium Therefore, we have x i ðc i ; c i Þx ið ; c i Þ; where 2½0;Š, i ¼ ; 2; ;N, and c i > 0 Therefore, the game defined by ðu ;U 2 ; ;U N Þ can be expressed as the following constraint optimization problem: max x i ð ;c i Þ¼ þ P c ðw þ NÞ i s:t: 2½0;Š i ¼ ; 2; ;N: ð20þ Theorem 6 x i ðcþði ¼ ; 2; ;NÞ is a continuous function of c>0 For any c i > 0, x iðcþ is strictly increasing and concave in 2½0;Š Proof From (9), we know that x i ð ;c iþ is continuously differentiable in 0 For any c i > 0, we have " i ð ;c i Þ ¼ðW þ þ P c i ð þ P > 0; c i " Þ2 2 x i ð ;c i Þ 2 ¼ðW þ NÞ i ð þ P c 2 i Þ3 ð þ P < 0: c i Þ2 Thus, x i ð ;c iþ is strictly increasing and concave for 2½0;Š, which implies that x i ð ;c iþ has a unique optimal solution c i in 2½0;Š, where i ¼ ; 2; ;N, that satisfies x i ð ; c i Þ <x iðc i ; c i Þ for 8 2½0;Šand 6¼ c i tu Theorem 6 establishes the concavity and continuity of x i ðcþ, where i ¼ ; 2; ;N, which guarantees the existence of a Nash equilibrium c for the game

10 LI ET AL: FREE-RIDING ON BITTORRENT-LIKE PEER-TO-PEER FILE SHARING SYSTEMS: MODELING ANALYSIS AND IMPROVEMENT 963 Fig 5 (a) The average download time of non-free-riders T n and free-riders T f with varying arrival rates of free-riders f, and! (b) The ratio between the average download time of non-free-riders and free-riders T n =T f as the departure rate of seeds varies Theorem 7 The strategy c i ¼ for the requesting downloader N i, where i ¼ ; 2; ;N, is a Nash equilibrium Proof Let us consider the constraint optimization problem (20) We have the following Lagrangian function: L i ð ;Þ¼ þ P c ðw þ NÞ ð Þ; i where is the Lagrangian multiplier The Kuhn- Tucker condition requires that there exists a nonnegative Lagrangian multiplier to satisfy the following conditions: i ¼ðW þ 4 P N c i i¼ c i 7 ¼ 0; 2 5 P N c i i¼ 0 ¼ ðc i Þ: If c i <, then ¼ 0, and then, P N i¼ ¼ However, we have c i > 0, which is a contradiction Therefore, an optimal solution for c i <does not exist If ¼, there exists a nonnegative Lagrangian multiplier, and a unique optimal solution exists in c i ¼ For any N i, where i ¼ ; 2; ;N, if < and 2½0;Š, then x i ð ; c i Þ <x ið; c i Þ Therefore, the strategy ¼ for the requesting downloader N i, where i ¼ ; 2; ;N,isa Nash equilibrium tu To maximize the download rate from seeds, each downloader will increase its uploading bandwidth to the system until it reaches its maximum limit At that point, it will refrain from changing its uploading bandwidth When each requesting downloader achieves its maximum uploading bandwidth, there exists a Nash equilibrium Therefore, our allocation policy implements an incentive for downloaders to contribute its uploading bandwidth to the system 7 SIMULATION RESULTS In this section, we present the results generated by performing two sets of simulations Our purpose is to 3 validate our analysis and support our seed bandwidth allocation strategy, as discussed in Sections 5 and 6 7 Model Validation In this simulation, we study the results from a discreteevent simulation of a BitTorrent-like network In the simulated network, we allow peers to dynamically join or leave the system The arrival process of peers is a Poisson process A peer can depart from the system after finishing their download and obtaining all pieces of the sharing file We set the served file size as 50 Mbytes, which is divided into 200 pieces and 256 Kbyte per piece The uploading bandwidth of non-free-riders and seeds is set as 500 Kbps, and there are no constraints on the downloading bandwidth The number of concurrent upload transfers of each peer is 5 One initial seed is inserted into the system in order to bootstrap the system, and,000 downloaders will join the system In Fig 5a, we plot the average download time of non-freeriders T n and free-riders T f with varying arrival rates of freeriders f and set n ¼ 4; 8; 6, respectively We set!, that is, non-free-riders will leave the system at once as soon as they have downloaded the file completely In the figure, we can see that the average download time of free-riders T f increases sharply, whereas the average download time of non-free-riders T n remains nearly unchanged as the value of f increases or the value of n decreases, which implies that BitTorrent mechanisms are successful in penalizing freeriding, in effect by increasing the download time of freeriders, which supports our modeling results In Fig 5b, we set n ¼ 4; 8; 6, respectively, and f ¼ It can be observed that with the decrease of the departure rate of seeds, the ratio between the average download time of non-free-riders and free-riders will increase Free-riders will download faster as the number of seeds in the system increases and may even download faster than non-freeriders with a high number of seeds, as shown in our modeling results in Fig 3a We believe that this is because the BitTorrent system does not provide an effective mechanism for seeds to guard against free-riding Moreover, when n increases, the ratio between T n and T f will increase, as our modeling analysis shows

11 964 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL 9, NO 7, JULY 2008 Fig 6 The ratio between the average download time of non-free-riders and free-riders T n =T f as the departure rate of seeds varies under each seed playing the seed bandwidth allocation strategy 72 Impact of the Seed Bandwidth Allocation Strategy In this simulation, we use the same discrete-event simulator in the first simulation to study the seed bandwidth allocation strategy based strictly on the contribution of downloaders in a BitTorrent-like network Our purpose is to evaluate the performance of the system when the seed employs the bandwidth allocation strategy and the original BitTorrent mechanisms We have the same setting as the first simulation From Fig 6, we find that when the seed bandwidth allocation strategy is employed, the ratio between the average download time of non-free-riders and free-riders will decrease as the departure rate of seeds decreases Furthermore, we observe that the average download time of non-free-riders is apparently smaller than that of free-riders, that is, non-free-riders always download faster than free-riders regardless of the number of seeds We compare the effect of the two strategies, that is, our bandwidth allocation strategy and the original BitTorrent mechanisms, on the average download time of free-riders and non-free-riders, and the results are shown in Figs 7a and 7b We set n ¼ 8 and f ¼ From Fig 7a, we find that the average download time of free-riders is not shortened with the increase of the number of seeds by employing the seed bandwidth allocation strategy, and the average download time of free-riders is increased compared with that using original BitTorrent mechanisms, which implies that the seed bandwidth allocation strategy is successful in penalizing free-riding and preventing free-riders from getting the downloading rate from seeds In Fig 7b, it is observed that the average download time of non-free-riders with the seed bandwidth allocation strategy is apparently shorter than that without this strategy, and non-free-riders will download faster with a high number of seeds From the result found in the simulation, we can see that the seed bandwidth allocation strategy not only penalizes free-riding but also is helpful to contributing peers In the above simulations, we study the impact of the seed bandwidth allocation strategy in a setting consisting of a homogeneous collection of non-free-riders In this simulation, we evaluate the seed bandwidth allocation strategy when the non-free-rider bandwidth is heterogeneous The uploading bandwidth of seeds is 500 Kbps, and the upload rates of non-free-riders are distributed uniformly over [200, 500] We compare the effect of our bandwidth allocation strategy and the original BitTorrent mechanisms on the average download time of free-riders and non-free-riders, and the results are shown in Figs 8a and 8b In Fig 8, we can see that just as in a homogeneous environment, the average download time of free-riders is not shortened with an increase in the number of seeds by employing the seed bandwidth allocation strategy (Fig 8a), whereas non-freeriders will download faster than that without this strategy (Fig 8b), when the non-free-rider bandwidth is heterogeneous Therefore, the seed bandwidth allocation strategy can prevent free-riding effectively and improves the performance of contributors not only in homogeneous environments but also in heterogeneous environments We compare the average download time of peers with various uploading bandwidths We set that there are an equal number of peers with 00 Kbps, 200 Kbps, 500 Kbps, and 800 Kbps uploading bandwidth The uploading bandwidth of seeds is 500 Kbps, and seeds do not leave the system ð ¼ 0Þ From Fig 9, we find that the average download time of peers with the high uploading bandwidth is shorter than that of peers with the low uploading bandwidth The average download time of peers with the high uploading Fig 7 The average download time of (a) free-riders and (b) non-free-riders under each seed playing the seed bandwidth allocation strategy and BitTorrent mechanisms

12 LI ET AL: FREE-RIDING ON BITTORRENT-LIKE PEER-TO-PEER FILE SHARING SYSTEMS: MODELING ANALYSIS AND IMPROVEMENT 965 Fig 8 In heterogeneous environment, the average download time of (a) free-riders and (b) non-free-riders under each seed playing the seed bandwidth allocation strategy and BitTorrent mechanisms bandwidth is shortened, whereas the average download time of peers with the low uploading bandwidth is prolonged by employing the seed bandwidth allocation strategy From the results found in the simulation, we can see that the seed bandwidth allocation strategy implements an incentive to peers to contribute services to the system 8 CONCLUSION In this paper, we first investigate the choking algorithm and optimistic unchoking of the BitTorrent mechanisms We find that BitTorrent mechanisms could not completely eliminate free-riding Free-riders can still get a downloading rate from contributors through optimistic unchoking To further elucidate the effect of free-riding, we developed a fluid model with two different classes of peers We find that the effect of optimistic unchoking on free-riding does not significantly impact the performance of the BitTorrent system BitTorrent s incentive mechanism is successful in preventing free-riding in a system without seeds However, BitTorrent mechanisms may not succeed in producing a disincentive for free-riding in a system having a large number of seeds, because free-riders can get a great deal of benefit from seeds and BitTorrent does not have an effective mechanism for seeds to guard against free-riding Fig 9 The average download time of peers with various uploading bandwidths Thus, we present a seed bandwidth allocation strategy based strictly on the uploading rate of peers in the BitTorrent system to prevent free-riders from getting benefit from seeds Our simulation results validate our analysis and show that the seed bandwidth allocation strategy not only guards against free-riding effectively but also quite effectively improves the performance of contributors In the future, we plan to extend our model to heterogeneous peers with different utility functions We will also conduct more exhaustive simulations to confirm the robustness of the seed bandwidth allocation strategy Further, we will validate our analysis and evaluate the proposed policy through empirical experimentation under a real environment ACKNOWLEDGMENTS This work was supported in part by the National Natural Science Foundation of China under Grants , , , and , and by the National Basic Research Program of China under Grant 2007CB30905 REFERENCES [] E Adar and BA Huberman, Free-Riding on Gnutella, First Monday, vol 5, no 0, Oct 2000 [2] D Hughes, G Coulson, and J Walkerdine, Free-Riding on Gnutella Revisited: The Bell Tolls, IEEE Distributed Systems Online, vol 6, no 6, 2005 [3] S Saroiu, PK Gummadi, and SD Gribble, A Measurement Study of Peer-to-Peer File Sharing Systems, Proc Conf Multimedia Computing and Networking (MMCN 02), Jan 2002 [4] BitTorrent, Inc, BitTorrent Web Site, [5] B Cohen, Incentives Build Robustness in BitTorrent, Proc ACM SIGCOMM Workshop Economics of Peer-to-Peer Systems (P2PECON), 2003 [6] A Parker, The True Picture of Peer-to-Peer File Sharing, wwwcachelogiccom/, 2004 [7] AR Bharambe, C Herley, and VN Padmanabhan, Analyzing and Improving BitTorrent Performance, Technical Report MSR-TR , Microsoft Research, Feb 2005 [8] S Jun and M Ahamad, Incentives in BitTorrent Induce Free Riding, Proc ACM SIGCOMM Workshop Economics of Peer-to-Peer Systems (P2PECON 05), Aug 2005 [9] D Qiu and R Srikant, Modeling and Performance Analysis of BitTorrent-Like Peer-to-Peer Networks, Proc ACM SIGCOMM 04, Aug 2004

13 966 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL 9, NO 7, JULY 2008 [0] M Yang, Z Zhang, X Li, and Y Dai, An Empirical Study of Free-Riding Behavior in the Maze P2P File-Sharing System, Proc Fourth Int l Workshop Peer-to-Peer Systems (IPTPS 05), Feb 2005 [] R Krishnan, M Smith, Z Tang, and R Telang, The Virtual Commons: Why Free-Riding Can Be Tolerated in Peer-to-Peer Networks, Proc Workshop Information Systems and Economics (WISE 03), Dec 2003 [2] M Feldman, C Papadimitriou, J Chuang, and I Stoica, Free-Riding and Whitewashing in Peer-to-Peer Systems, Proc ACM SIGCOMM Workshop Practice and Theory of Incentives in Networked Systems (PINS 04), Aug 2004 [3] KaZaA, [4] emule, [5] L Guo, S Chen, Z Xiao, E Tan, X Ding, and X Zhang, Measurements, Analysis, and Modeling of BitTorrent-Like Systems, Proc Internet Measurement Conf (IMC 05), Oct 2005 [6] M Izal, G Urvoy-Keller, E Biersack, P Felber, A Hamra, and L Garces-Erice, Dissecting BitTorrent: Five Months in a Torrents Lifetime, Proc Fifth Passive and Active Measurements Workshop (PAM 04), Apr 2004 [7] JA Pouwelse, P Garbacki, DHJ Epema, and HJ Sips, A Measurement Study of the BitTorrent Peer-to-Peer File-Sharing System, Technical Report PDS , Delft Univ of Technology, The Netherlands, Apr 2004 [8] JA Pouwelse, P Garbacki, DHJ Epema, and HJ Sips, The BitTorrent P2P File-Sharing System: Measurements and Analysis, Proc Fourth Int l Workshop Peer-to-Peer Systems (IPTPS 05), Feb 2005 [9] Z Ge, DR Figueiredo, S Jaiswal, J Kurose, and D Towsley, Modeling Peer-Peer File Sharing Systems, Proc IEEE INFOCOM, 2003 [20] K Ramachandran and B Sikdar, An Analytic Framework for Modeling Peer to Peer Networks, Proc IEEE INFOCOM 05, Mar 2005 [2] X Yang and G de Veciana, Service Capacity of Peer to Peer Networks, Proc IEEE INFOCOM, 2004 [22] Y Tian, D Wu, and K-W Ng, Modeling, Analysis and Improvement for BitTorrent-Like File Sharing Networks, Proc IEEE INFOCOM, 2006 [23] FL Piccolo, G Neglia, and G Bianchi, The Effect of Heterogeneous Link Capacities in BitTorrent-Like File Sharing Systems, Proc Int l Workshop Hot Topics in Peer-to-Peer Systems (HOT-P2P), 2004 [24] F Clvenot-Perronnin and KRP Nain, Multiclass P2P Networks: Static Resource Allocation for Service Differentiation and Bandwidth Diversity, Proc 24th Int l Symp Computer Performance, Modeling, Measurements and Evaluation (Performance), 2005 [25] D Bertsekas and R Gallager, Data Networks Prentice Hall, 987 [26] N Liogkas, R Nelson, E Kohler, and L Zhang, Exploiting BitTorrent for Fun (but Not Profit), Proc Fifth Int l Workshop Peer-to-Peer Systems(IPTPS 06), Feb 2006 [27] A Srinivasan, J Teitelbaum, and J Wu, DRBTS: Distributed Reputation-Based Beacon Trust System, Proc Second IEEE Int l Symp Dependable, Autonomic and Secure Computing (DASC), 2006 [28] SD Kamvar, MT Schlosser, and H Garcia-Molina, The EigenTrust Algorithm for Reputation Management in P2P Networks, Proc 2th Int l World Wide Web Conf (WWW 03), May 2003 [29] FP Kelly, Mathematical Modelling of the Internet, Mathematics Unlimited 200 and Beyond, B Engquist and W Schmid, eds, pp , Springer, 200 Minglu Li received the degree from the School of Electronic Technology, University of Information Engineering, in 985 and the PhD degree in computer software from Shanghai Jiao Tong University (SJTU), Shanghai, in 996 He is a full professor and the vice chair of the Department of Computer Science and Engineering and the director of the Grid Computing Center at SJTU Currently, his research interests include grid computing, services computing, and sensor networks He has presided over 20 projects supported by the National Natural Science Foundation, National Key Technology R&D Program, 863 Program, 973 Program, and Science and Technology Commission of Shanghai Municipality (STCSM) He has published more than 00 papers in academic journals and international conference proceedings He is also a member of the Expert Committee of the ChinaGrid Program of the Ministry of Education, a principal scientist of Shanghai- Grid, which is a grand project of STCSM, a member of the Executive Committee of the ChinaGrid Forum, and a member of the Executive Committee of the Technical Committee on Services Computing of the IEEE Computer Society Jiadi Yu received the MS degree in computer science from Xi an Technological University, Xi an, China, in 2003 and the PhD degree in computer science from Shanghai Jiao Tong University, Shanghai, in 2007 He is a postdoc in the Ad Hoc Network and Network Computing Center and the Department of Computer Science and Engineering at Shanghai Jiao Tong University His research interests include networking, P2P computing, mobile computing, and wireless sensor networks Jie Wu is a distinguished professor in the Department of Computer Science and Engineering, Florida Atlantic University, and a program director at the US National Science Foundation His research interests are in the areas of wireless networks and mobile computing, routing protocols, fault-tolerant computing, and interconnection networks He has published more than 350 papers in various journals and conference proceedings He is the author of the text Distributed System Design, published by the CRC Press He was on the editorial board of the IEEE Transactions on Parallel and Distributed Systems and was a co-guest editor of Computer and the Journal of Parallel and Distributed Computing He served as a program cochair for MASS 2004, a program vice chair for ICDCS 200, and a program vice chair for ICPP 2000 He was also the general chair for MASS 2006 and is the general chair for IPDPS 2008 He was also the recipient of the , , and Researcher of the Year Award at Florida Atlantic University He has served as an IEEE Computer Society distinguished visitor and is the chairman of IEEE Technical Committee on Distributed Processing (TCDP) He is a senior member of the IEEE and a member of the ACM For more information on this or any other computing topic, please visit our Digital Library at wwwcomputerorg/publications/dlib

Modeling and Performance Analysis of BitTorrent-Like Peer-to-Peer Networks

Modeling and Performance Analysis of BitTorrent-Like Peer-to-Peer Networks Modeling and Performance Analysis of BitTorrent-Like Peer-to-Peer Networks Dongyu Qiu and R. Srikant Coordinated Science Laboratory University of Illinois at Urbana-Champaign CSL, UIUC p.1/22 Introduction

More information

CBT: A proximity-aware peer clustering system in large-scale BitTorrent-like peer-to-peer networks

CBT: A proximity-aware peer clustering system in large-scale BitTorrent-like peer-to-peer networks Available online at www.sciencedirect.com Computer Communications 31 (28) 591 62 www.elsevier.com/locate/comcom CBT: A proximity-aware peer clustering system in large-scale BitTorrent-like peer-to-peer

More information

Performance Analysis and Improvement for BitTorrent-like File Sharing Systems

Performance Analysis and Improvement for BitTorrent-like File Sharing Systems CONCURRENCY AND COMPUTATION: PRACTICE AND EXPERIENCE Concurrency Computat.: Pract. Exper. 2007; 00:1 7 [Version: 2002/09/19 v2.02] Performance Analysis and Improvement for BitTorrent-like File Sharing

More information

Performance Improvements of Peer-to-Peer File Sharing

Performance Improvements of Peer-to-Peer File Sharing 0 Performance Improvements of Peer-to-Peer File Sharing Dongyu Qiu Concordia University Canada 1. Introduction In recent years, Peer-to-Peer (P2P) applications, in which peers serve as both clients and

More information

Stochastic Analysis and File Availability Enhancement for BT-like File Sharing Systems

Stochastic Analysis and File Availability Enhancement for BT-like File Sharing Systems Stochastic Analysis and File Availability Enhancement for BT-like File Sharing Systems Fan Bin Dah-Ming Chiu John C.S. Lui Abstract In this paper, we present the mathematical analysis of two important

More information

The Design Trade-offs of BitTorrent-like File Sharing Protocols

The Design Trade-offs of BitTorrent-like File Sharing Protocols The Design Trade-offs of BitTorrent-like File Sharing Protocols Bin Fan John C.S. Lui Dah-Ming Chiu Abstract The BitTorrent BT file sharing protocol is very popular due to its scalability property and

More information

BitTorrent Fairness Analysis

BitTorrent Fairness Analysis BitTorrent Fairness Analysis Team Asians Zhenkuang He Gopinath Vasalamarri Topic Summary Aim to test how the fairness affect the file transfer speed in a P2P environment (here using the BitTorrent Protocol)

More information

Do incentives build robustness in BitTorrent?

Do incentives build robustness in BitTorrent? Do incentives build robustness in BitTorrent? ronghui.gu@yale.edu Agenda 2 Introduction BitTorrent Overview Modeling Altruism in BitTorrent Building BitTyrant Evaluation Conclusion Introduction 3 MAIN

More information

Scalability of the BitTorrent P2P Application

Scalability of the BitTorrent P2P Application Scalability of the BitTorrent P2P Application Kolja Eger, Ulrich Killat Hamburg University of Technology 5.Würzburger Workshop 8.-9. July 2005 Overview File dissemination in peer-to-peer (p2p) networks

More information

Design Space Analysis for Modeling Incentives in Distributed Systems

Design Space Analysis for Modeling Incentives in Distributed Systems Design Space Analysis for Modeling Incentives in Distributed Systems by Rameez Rahman, Tamas Vinko, David Hales, Johan Pouwelse, and Henk Sips Delft University of Technology 1 Incentives in Distributed

More information

978 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 14, NO. 5, OCTOBER 2006

978 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 14, NO. 5, OCTOBER 2006 978 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 14, NO. 5, OCTOBER 2006 Incentive and Service Dferentiation in P2P Networks: A Game Theoretic Approach Richard T. B. Ma, Sam C. M. Lee, John C. S. Lui, Senior

More information

The Delicate Tradeoffs in BitTorrent-like File Sharing Protocol Design

The Delicate Tradeoffs in BitTorrent-like File Sharing Protocol Design The Delicate Tradeoffs in BitTorrent-like File Sharing Protocol Design Bin Fan Dept. of Computer Science Eng. The Chinese University of Hong Kong Email: bfan@cse.cuhk.edu.hk Dah-Ming Chiu Dept. of Information

More information

inria , version 1-6 Sep 2006

inria , version 1-6 Sep 2006 Rarest First and Choke Algorithms Are Enough Arnaud Legout I.N.R.I.A. Sophia Antipolis France arnaud.legout@sophia.inria.fr G. Urvoy-Keller and P. Michiardi Institut Eurecom Sophia Antipolis France {Guillaume.Urvoy,Pietro.Michiardi}@eurecom.fr

More information

Bandwidth Trading in Unstructured P2P Content Distribution Networks

Bandwidth Trading in Unstructured P2P Content Distribution Networks Bandwidth Trading in Unstructured P2P Content Distribution Networks Kolja Eger and Ulrich Killat Department of Communication Networks Hamburg University of Technology (TUHH) {eger, killat}@tu-harburg.de

More information

Analyzing and Improving a BitTorrent Network s Performance Mechanisms

Analyzing and Improving a BitTorrent Network s Performance Mechanisms Analyzing and Improving a BitTorrent Network s Performance Mechanisms Ashwin R. Bharambe Cormac Herley Venkata N. Padmanabhan Carnegie Mellon University Microsoft Research Microsoft Research Abstract In

More information

Understanding and Deconstructing BitTorrent Performance

Understanding and Deconstructing BitTorrent Performance Understanding and Deconstructing BitTorrent Performance Ashwin R. Bharambe Carnegie Mellon University Cormac Herley Venkata N. Padmanabhan Microsoft Research January 25 Technical Report MSR-TR-25-3 Microsoft

More information

Modeling, Analysis and Improvement for BitTorrent-Like File Sharing Networks

Modeling, Analysis and Improvement for BitTorrent-Like File Sharing Networks Modeling, Analysis and Improvement for BitTorrent-Like File Sharing etworks Ye Tian, Di Wu, and Kam Wing g Department of Computer Science and Engineering The Chinese University of Hong Kong Shatin,.T.,

More information

Content Distribution and BitTorrent [Based on slides by Cosmin Arad]

Content Distribution and BitTorrent [Based on slides by Cosmin Arad] ID2210 - Distributed Computing, Peer-to-Peer and GRIDS Content Distribution and BitTorrent [Based on slides by Cosmin Arad] Today The problem of content distribution A popular solution: BitTorrent Underlying

More information

arxiv:cs.ni/ v1 21 Nov 2006

arxiv:cs.ni/ v1 21 Nov 2006 Clustering and Sharing Incentives in BitTorrent Systems Arnaud Legout Nikitas Liogkas Eddie Kohler Lixia Zhang I.N.R.I.A. University of California, Los Angeles Sophia Antipolis, France Los Angeles, CA,

More information

BitTorrent. Masood Khosroshahy. July Tech. Report. Copyright 2009 Masood Khosroshahy, All rights reserved.

BitTorrent. Masood Khosroshahy. July Tech. Report. Copyright 2009 Masood Khosroshahy, All rights reserved. BitTorrent Masood Khosroshahy July 2009 Tech. Report Copyright 2009 Masood Khosroshahy, All rights reserved. www.masoodkh.com Contents Contents 1 Basic Concepts 1 2 Mechanics 3 2.1 Protocols: Tracker and

More information

Efficiency of Data Distribution in BitTorrent-Like Systems

Efficiency of Data Distribution in BitTorrent-Like Systems Efficiency of Data Distribution in BitTorrent-Like Systems Ho-Leung Chan 1,, Tak-Wah Lam 2, and Prudence W.H. Wong 3 1 Department of Computer Science, University of Pittsburgh hlchan@cs.pitt.edu 2 Department

More information

THE PEER-TO-PEER (P2P) paradigm has proved to be

THE PEER-TO-PEER (P2P) paradigm has proved to be 140 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 12, NO. 2, SECOND QUARTER 2010 A Survey of BitTorrent Performance Raymond Lei Xia and Jogesh K. Muppala, Senior Member, IEEE Abstract Since its inception,

More information

T-Chain: A General Incentive Scheme for Cooperative Computing

T-Chain: A General Incentive Scheme for Cooperative Computing : A General Incentive Scheme for Cooperative Computing Kyuyong Shin, Carlee Joe-Wong, Sangtae Ha, Yung Yi, Injong Rhee, Douglas Reeves Korea Military Academy, Princeton University, University of Colorado

More information

A Trace Study of BitTorrent P2P File Distribution with Downloading-Side Performance Measurement and Analysis

A Trace Study of BitTorrent P2P File Distribution with Downloading-Side Performance Measurement and Analysis A Trace Study of BitTorrent P2P File Distribution with Downloading-Side Performance Measurement and Analysis Chih-Lin HU* and Zong-Xian LU Department of Communication Engineering, National Central University,

More information

ARTICLE IN PRESS. Journal of Network and Computer Applications

ARTICLE IN PRESS. Journal of Network and Computer Applications Journal of Network and Computer Applications 32 (29) 666 683 Contents lists available at ScienceDirect Journal of Network and Computer Applications journal homepage: www.elsevier.com/locate/jnca Principles

More information

Peer-to-Peer Applications Reading: 9.4

Peer-to-Peer Applications Reading: 9.4 Peer-to-Peer Applications Reading: 9.4 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides are obtained from other sources,

More information

CSE 486/586 Distributed Systems Peer-to-Peer Architectures

CSE 486/586 Distributed Systems Peer-to-Peer Architectures CSE 486/586 Distributed Systems eer-to-eer Architectures Steve Ko Computer Sciences and Engineering University at Buffalo CSE 486/586 Last Time Gossiping Multicast Failure detection Today s Question How

More information

Content Overlays (continued) Nick Feamster CS 7260 March 26, 2007

Content Overlays (continued) Nick Feamster CS 7260 March 26, 2007 Content Overlays (continued) Nick Feamster CS 7260 March 26, 2007 Administrivia Quiz date Remaining lectures Interim report PS 3 Out Friday, 1-2 problems 2 Structured vs. Unstructured Overlays Structured

More information

Improving BitTorrent: A Simple Approach

Improving BitTorrent: A Simple Approach Improving BitTorrent: A Simple Approach Alix L.H. Chow Univ. of Southern California Leana Golubchik Univ. of Southern California Vishal Misra Columbia University Abstract Measurement studies have shown

More information

Utility-Based Rate Control in the Internet for Elastic Traffic

Utility-Based Rate Control in the Internet for Elastic Traffic 272 IEEE TRANSACTIONS ON NETWORKING, VOL. 10, NO. 2, APRIL 2002 Utility-Based Rate Control in the Internet for Elastic Traffic Richard J. La and Venkat Anantharam, Fellow, IEEE Abstract In a communication

More information

A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks

A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 8, NO. 6, DECEMBER 2000 747 A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks Yuhong Zhu, George N. Rouskas, Member,

More information

A connection management protocol for promoting cooperation in Peer-to-Peer networks q

A connection management protocol for promoting cooperation in Peer-to-Peer networks q Available online at www.sciencedirect.com Computer Communications 31 (2008) 240 256 www.elsevier.com/locate/comcom A connection management protocol for promoting cooperation in Peer-to-Peer networks q

More information

Impact of Inner Parameters and Overlay Structure on the Performance of BitTorrent

Impact of Inner Parameters and Overlay Structure on the Performance of BitTorrent Impact of Inner Parameters and Overlay Structure on the Performance of BitTorrent Guillaume Urvoy-Keller Institut Eurecom, France Email: urvoy@eurecom.fr Pietro Michiardi Institut Eurecom, France Email:

More information

Lecture 17: Peer-to-Peer System and BitTorrent

Lecture 17: Peer-to-Peer System and BitTorrent CSCI-351 Data communication and Networks Lecture 17: Peer-to-Peer System and BitTorrent (I swear I only use it for Linux ISOs) The slide is built with the help of Prof. Alan Mislove, Christo Wilson, and

More information

P2P VoD Systems: Modelling and Performance

P2P VoD Systems: Modelling and Performance P2P VoD Systems: Modelling and Performance Samuli Aalto, Aalto University, Finland Pasi Lassila, Aalto University, Finland Niklas Raatikainen, HIIT, Finland Petri Savolainen, HIIT, Finland Sasu Tarkoma,

More information

Computational efficiency analysis of Wu et al. s fast modular multi-exponentiation algorithm

Computational efficiency analysis of Wu et al. s fast modular multi-exponentiation algorithm Applied Mathematics and Computation 190 (2007) 1848 1854 www.elsevier.com/locate/amc Computational efficiency analysis of Wu et al. s fast modular multi-exponentiation algorithm Da-Zhi Sun a, *, Jin-Peng

More information

FairTorrent: Bringing Fairness to Peer-to-Peer Systems. Alex Sherman, Jason Nieh, and Cliff Stein Department of Computer Science Columbia University

FairTorrent: Bringing Fairness to Peer-to-Peer Systems. Alex Sherman, Jason Nieh, and Cliff Stein Department of Computer Science Columbia University FairTorrent: Bringing Fairness to Peer-to-Peer s Alex Sherman, Jason Nieh, and Cliff Stein Department of Computer Science Columbia University Technical Report CUCS-29-8 May, 28 {asherman, nieh, cliff}@cs.columbia.edu

More information

A new caching policy for cloud assisted Peer-to-Peer video on-demand services

A new caching policy for cloud assisted Peer-to-Peer video on-demand services A new caching policy for cloud assisted Peer-to-Peer video on-demand services Franco Robledo, Pablo Rodríguez-Bocca, Pablo Romero and Claudia Rostagnol Facultad de Ingeniería, Universidad de la República.

More information

ON THE STUDY OF THE OPTIMISITC UNCHOKING ALGORITHMS AND INCENTIVE MECHANISMS OF BITTORRENT

ON THE STUDY OF THE OPTIMISITC UNCHOKING ALGORITHMS AND INCENTIVE MECHANISMS OF BITTORRENT ON THE STUDY OF THE OPTIMISITC UNCHOKING ALGORITHMS AND INCENTIVE MECHANISMS OF BITTORRENT ZUHUI MA A THESIS IN THE DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING PRESENTED IN PARTIAL FULFILLMENT OF

More information

FairTorrent: A Deficit-Based Distributed Algorithm to Ensure Fairness in Peer-to-Peer Systems

FairTorrent: A Deficit-Based Distributed Algorithm to Ensure Fairness in Peer-to-Peer Systems IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 20, NO. 5, OCTOBER 2012 1361 FairTorrent: A Deficit-Based Distributed Algorithm to Ensure Fairness in Peer-to-Peer Systems Alex Sherman, Jason Nieh, and Clifford

More information

Delft University of Technology Parallel and Distributed Systems Report Series. Bandwidth Allocation in BitTorrent-like VoD Systems under Flashcrowds

Delft University of Technology Parallel and Distributed Systems Report Series. Bandwidth Allocation in BitTorrent-like VoD Systems under Flashcrowds Delft University of Technology Parallel and Distributed Systems Report Series Bandwidth Allocation in BitTorrent-like VoD Systems under Flashcrowds Lucia D Acunto, Tamás Vinkó, Henk Sips ldacunto@tudelftnl

More information

P2P Applications. Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli

P2P Applications. Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli P2P Applications Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli Server-based Network Peer-to-peer networks A type of network

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK PEER-TO-PEER FILE SHARING WITH THE BITTORRENT PROTOCOL APURWA D. PALIWAL 1, PROF.

More information

Scheduling Algorithms to Minimize Session Delays

Scheduling Algorithms to Minimize Session Delays Scheduling Algorithms to Minimize Session Delays Nandita Dukkipati and David Gutierrez A Motivation I INTRODUCTION TCP flows constitute the majority of the traffic volume in the Internet today Most of

More information

Boosting Market Liquidity of Peer-to-Peer Systems Through Cyclic Trading

Boosting Market Liquidity of Peer-to-Peer Systems Through Cyclic Trading Boosting Market Liquidity of Peer-to-Peer Systems Through Cyclic Trading Raphael Eidenbenz Thomas Locher Stefan Schmid Raphael+Roger: ETH Zurich DCG Thomas: ABB Research Roger Wattenhofer T-Labs Stefan:

More information

FOUR EDGE-INDEPENDENT SPANNING TREES 1

FOUR EDGE-INDEPENDENT SPANNING TREES 1 FOUR EDGE-INDEPENDENT SPANNING TREES 1 Alexander Hoyer and Robin Thomas School of Mathematics Georgia Institute of Technology Atlanta, Georgia 30332-0160, USA ABSTRACT We prove an ear-decomposition theorem

More information

Improving Performance of BitTorrent Network through Incentive Mechanism

Improving Performance of BitTorrent Network through Incentive Mechanism San Jose State University SJSU ScholarWorks Master's Projects Master's Theses and Graduate Research Summer 2011 Improving Performance of BitTorrent Network through Incentive Mechanism Mingzhe Li San Jose

More information

CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4. Xiaowei Yang

CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4. Xiaowei Yang CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4 Xiaowei Yang xwy@cs.duke.edu Overview Problem Evolving solutions IP multicast Proxy caching Content distribution networks

More information

UNCORRECTED PROOF AUTHOR'S PROOF. Keywords Energy-efficiency. Proxy. Peer-to-peer. BitTorrent. Broadband router. Mobile.

UNCORRECTED PROOF AUTHOR'S PROOF. Keywords Energy-efficiency. Proxy. Peer-to-peer. BitTorrent. Broadband router. Mobile. 1 3 2 DOI 10.1007/s12083-011-0107-5 4 Modeling resource constrained BitTorrent proxies for energy 5 efficient mobile content sharing 6 Imre Kelényi & Jukka K. Nurminen & Ákos Ludányi & 7 Tamás Lukovszki

More information

Flash Crowd in P2P Live Streaming Systems: Fundamental Characteristics and Design Implications

Flash Crowd in P2P Live Streaming Systems: Fundamental Characteristics and Design Implications IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 23, NO. 7, JULY 212 1227 Flash Crowd in P2P Live Streaming Systems: Fundamental Characteristics and Design Implications Fangming Liu, Member,

More information

MANY real-time applications can use different encoding

MANY real-time applications can use different encoding IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 3, NO. 1, JANUARY-MARCH 2004 1 Analysis of Adaptive Bandwidth Allocation in Wireless Networks with Multilevel Degradable Quality of Service Chun-Ting Chou and

More information

improving the performance and robustness of P2P live streaming with Contracts

improving the performance and robustness of P2P live streaming with Contracts MICHAEL PIATEK AND ARVIND KRISHNAMURTHY improving the performance and robustness of P2P live streaming with Contracts Michael Piatek is a graduate student at the University of Washington. After spending

More information

Improving the Download Time of BitTorrent-like Systems

Improving the Download Time of BitTorrent-like Systems Improving the Download Time of BitTorrent-like Systems Chi-Jen Wu, Cheng-Ying Li, and Jan-Ming Ho Institute of Information Science Academia Sinica, Taiwan {cjwu, cyli, hoho}@iis.sinica.edu.tw Abstract

More information

On the impact of propogation delay on mining rewards in Bitcoin. Xuan Wen 1. Abstract

On the impact of propogation delay on mining rewards in Bitcoin. Xuan Wen 1. Abstract On the impact of propogation delay on mining rewards in Bitcoin Xuan Wen 1 Abstract Bitcoin 2 is a decentralized digital currency that is rapidly gaining in popularity. The Bitcoin system relies on miners

More information

On the Computational Complexity of Nash Equilibria for (0, 1) Bimatrix Games

On the Computational Complexity of Nash Equilibria for (0, 1) Bimatrix Games On the Computational Complexity of Nash Equilibria for (0, 1) Bimatrix Games Bruno Codenotti Daniel Štefankovič Abstract The computational complexity of finding a Nash equilibrium in a nonzero sum bimatrix

More information

IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 8, NO. 2, APRIL Segment-Based Streaming Media Proxy: Modeling and Optimization

IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 8, NO. 2, APRIL Segment-Based Streaming Media Proxy: Modeling and Optimization IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 8, NO. 2, APRIL 2006 243 Segment-Based Streaming Media Proxy: Modeling Optimization Songqing Chen, Member, IEEE, Bo Shen, Senior Member, IEEE, Susie Wee, Xiaodong

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

Stretch-Optimal Scheduling for On-Demand Data Broadcasts

Stretch-Optimal Scheduling for On-Demand Data Broadcasts Stretch-Optimal Scheduling for On-Demand Data roadcasts Yiqiong Wu and Guohong Cao Department of Computer Science & Engineering The Pennsylvania State University, University Park, PA 6 E-mail: fywu,gcaog@cse.psu.edu

More information

Application Layer: P2P File Distribution

Application Layer: P2P File Distribution Application Layer: P2P File Distribution EECS 3214 Slides courtesy of J.F Kurose and K.W. Ross, All Rights Reserved 29-Jan-18 1-1 Chapter 2: outline 2.1 principles of network applications 2.2 Web and HTTP

More information

A Fuzzy Approach For Piece Selection In Bit Torrent Like Peer To Peer Network. * M. Padmavathi, ** R. M. Suresh

A Fuzzy Approach For Piece Selection In Bit Torrent Like Peer To Peer Network. * M. Padmavathi, ** R. M. Suresh A Fuzzy Approach For Piece Selection In Bit Torrent Like Peer To Peer Network * M. Padmavathi, ** R. M. Suresh * Assistant Professor, Department of Information Technology, RMD Engineering College, PO box

More information

THE Internet is becoming more commercially oriented

THE Internet is becoming more commercially oriented IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 15, NO. 5, MAY 2004 1 A Proportional-Delay DiffServ-Enabled Web Server: Admission Control and Dynamic Adaptation Sam C.M. Lee, John C.S. Lui,

More information

Medium Access Control Protocols With Memory Jaeok Park, Member, IEEE, and Mihaela van der Schaar, Fellow, IEEE

Medium Access Control Protocols With Memory Jaeok Park, Member, IEEE, and Mihaela van der Schaar, Fellow, IEEE IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 6, DECEMBER 2010 1921 Medium Access Control Protocols With Memory Jaeok Park, Member, IEEE, and Mihaela van der Schaar, Fellow, IEEE Abstract Many existing

More information

Extreme Computing. BitTorrent and incentive-based overlay networks.

Extreme Computing. BitTorrent and incentive-based overlay networks. Extreme Computing BitTorrent and incentive-based overlay networks BitTorrent Today we will focus on BitTorrent The technology really has three aspects A standard that BitTorrent client systems follow Some

More information

Optimal Routing Control: Repeated Game Approach

Optimal Routing Control: Repeated Game Approach IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 47, NO. 3, MARCH 2002 437 Optimal Routing Control: Repeated Game Approach Richard J. La and Venkat Anantharam, Fellow, IEEE Abstract Communication networks

More information

WITH recent advance in networking, multimedia signal

WITH recent advance in networking, multimedia signal 396 IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 11, NO. 3, APRIL 2009 Incentive Cooperation Strategies for Peer-to-Peer Live Multimedia Streaming Social Networks W. Sabrina Lin, Member, IEEE, H. Vicky Zhao,

More information

RECENT advances in computing have seen the emergence

RECENT advances in computing have seen the emergence 418 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 19, NO. 3, MARCH 2008 Hierarchical Scheduling for Symmetric Multiprocessors Abhishek Chandra, Member, IEEE, and Prashant Shenoy, Senior Member,

More information

Stay or Go? Participation in Under-Provisioned Video Streams

Stay or Go? Participation in Under-Provisioned Video Streams Stay or Go? Participation in Under-Provisioned Video Streams Dave Levin Daniel Malter Neil Spring Bobby Bhattacharjee University of Maryland, Computer Science Department, Robert H. Smith School of Business

More information

Modeling Leechers Attack in BitTorrent

Modeling Leechers Attack in BitTorrent Modeling Leechers in BitTorrent Lin Ye, Hongli Zhang School of Computer Science and Technology Harbin Institute of Technology Harbin, China, 151 Email: hityelin@gmail.com, zhanghongli@hit.edu.cn Xiaojiang

More information

Over-contribution in discretionary databases

Over-contribution in discretionary databases Over-contribution in discretionary databases Mike Klaas klaas@cs.ubc.ca Faculty of Computer Science University of British Columbia Outline Over-contribution in discretionary databases p.1/1 Outline Social

More information

Last Lecture SMTP. SUNY at Buffalo; CSE 489/589 Modern Networking Concepts; Fall 2010; Instructor: Hung Q. Ngo 1

Last Lecture SMTP. SUNY at Buffalo; CSE 489/589 Modern Networking Concepts; Fall 2010; Instructor: Hung Q. Ngo 1 Last Lecture SMTP SUNY at Buffalo; CSE 489/589 Modern Networking Concepts; Fall 2010; Instructor: Hung Q. Ngo 1 This Lecture Peer-to-Peer (P2P) Applications SUNY at Buffalo; CSE 489/589 Modern Networking

More information

General properties of staircase and convex dual feasible functions

General properties of staircase and convex dual feasible functions General properties of staircase and convex dual feasible functions JÜRGEN RIETZ, CLÁUDIO ALVES, J. M. VALÉRIO de CARVALHO Centro de Investigação Algoritmi da Universidade do Minho, Escola de Engenharia

More information

Distributed Data Management. Christoph Lofi Institut für Informationssysteme Technische Universität Braunschweig

Distributed Data Management. Christoph Lofi Institut für Informationssysteme Technische Universität Braunschweig Distributed Data Management Christoph Lofi Institut für Informationssysteme Technische Universität Braunschweig http://www.ifis.cs.tu-bs.de 8.0 Content Provisioning 8.0 Content Distribution 8.1 Swarming

More information

III Data Structures. Dynamic sets

III Data Structures. Dynamic sets III Data Structures Elementary Data Structures Hash Tables Binary Search Trees Red-Black Trees Dynamic sets Sets are fundamental to computer science Algorithms may require several different types of operations

More information

IN wireless ad hoc networks, wireless nodes communicate

IN wireless ad hoc networks, wireless nodes communicate IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 17, NO. 9, SEPTEMBER 2006 947 Energy Optimization under Informed Mobility Chiping Tang, Member, IEEE, and Philip K. McKinley, Member, IEEE Abstract

More information

Towards Low-Redundancy Push-Pull P2P Live Streaming

Towards Low-Redundancy Push-Pull P2P Live Streaming Towards Low-Redundancy Push-Pull P2P Live Streaming Zhenjiang Li, Yao Yu, Xiaojun Hei and Danny H.K. Tsang Department of Electronic and Computer Engineering The Hong Kong University of Science and Technology

More information

On TCP friendliness of VOIP traffic

On TCP friendliness of VOIP traffic On TCP friendliness of VOIP traffic By Rashmi Parthasarathy WSU ID # 10975537 A report submitted in partial fulfillment of the requirements of CptS 555 Electrical Engineering and Computer Science Department

More information

Achieve Significant Throughput Gains in Wireless Networks with Large Delay-Bandwidth Product

Achieve Significant Throughput Gains in Wireless Networks with Large Delay-Bandwidth Product Available online at www.sciencedirect.com ScienceDirect IERI Procedia 10 (2014 ) 153 159 2014 International Conference on Future Information Engineering Achieve Significant Throughput Gains in Wireless

More information

EECS 3214 Midterm Test Winter 2017 March 2, 2017 Instructor: S. Datta. 3. You have 120 minutes to complete the exam. Use your time judiciously.

EECS 3214 Midterm Test Winter 2017 March 2, 2017 Instructor: S. Datta. 3. You have 120 minutes to complete the exam. Use your time judiciously. EECS 3214 Midterm Test Winter 2017 March 2, 2017 Instructor: S. Datta Name (LAST, FIRST): Student number: Instructions: 1. If you have not done so, put away all books, papers, and electronic communication

More information

WIRELESS sensor networks have been deployed in a

WIRELESS sensor networks have been deployed in a IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 11, NO. 3, MARCH 2012 439 Fault Localization Using Passive End-to-End Measurements and Sequential Testing for Wireless Sensor Networks Bing Wang, Member, IEEE,

More information

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data An Efficient Privacy-Preserving Ranked Keyword Search Method Cloud data owners prefer to outsource documents in an encrypted form for the purpose of privacy preserving. Therefore it is essential to develop

More information

Understanding BitTorrent: An Experimental Perspective

Understanding BitTorrent: An Experimental Perspective Understanding BitTorrent: An Experimental Perspective Arnaud Legout, Guillaume Urvoy-Keller, Pietro Michiardi To cite this version: Arnaud Legout, Guillaume Urvoy-Keller, Pietro Michiardi. Understanding

More information

654 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 55, NO. 2, MARCH 2006

654 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 55, NO. 2, MARCH 2006 654 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 55, NO. 2, MARCH 2006 Optimal Resource Allocation and Adaptive Call Admission Control for Voice/Data Integrated Cellular Networks Chi Wa Leong, Weihua

More information

IN a mobile ad hoc network, nodes move arbitrarily.

IN a mobile ad hoc network, nodes move arbitrarily. IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 5, NO. 6, JUNE 2006 609 Distributed Cache Updating for the Dynamic Source Routing Protocol Xin Yu Abstract On-demand routing protocols use route caches to make

More information

Cooperation in Open Distributed Systems. Stefan Schmid

Cooperation in Open Distributed Systems. Stefan Schmid Cooperation in Open Distributed Systems Stefan Schmid T-Labs, Berlin, July 2, 2009 Distributed Systems 2008/9 Wireless: Many mobile phones today have WLAN (and even Skype) P2P: Olympic games 2008 live-broadcast

More information

Serving Niche Video-on-Demand Content in a Managed P2P Environment

Serving Niche Video-on-Demand Content in a Managed P2P Environment 1 Serving Niche Video-on-Demand Content in a Managed P2P Environment Eli Brosh 1, Chitra Agastya 2, John Morales 2, Vishal Misra 1, Dan Rubenstein 1 affaddr Department of Computer Science, Columbia University

More information

A Distributed Formation of Orthogonal Convex Polygons in Mesh-Connected Multicomputers

A Distributed Formation of Orthogonal Convex Polygons in Mesh-Connected Multicomputers A Distributed Formation of Orthogonal Convex Polygons in Mesh-Connected Multicomputers Jie Wu Department of Computer Science and Engineering Florida Atlantic University Boca Raton, FL 3343 Abstract The

More information

Doctoral Written Exam in Networking, Fall 2008

Doctoral Written Exam in Networking, Fall 2008 Doctoral Written Exam in Networking, Fall 2008 December 5, 2008 Answer all parts of all questions. There are four multi-part questions, each of equal weight. Turn in your answers by Thursday, December

More information

Cumulative Reputation Systems for Peer-to-Peer Content Distribution

Cumulative Reputation Systems for Peer-to-Peer Content Distribution Cumulative Reputation Systems for Peer-to-Peer Content Distribution B. Mortazavi and G. Kesidis Pennsylvania State University also with Verizon Wireless CISS Princeton March 23, 2006 1 Outline P2P CDNs

More information

ARELAY network consists of a pair of source and destination

ARELAY network consists of a pair of source and destination 158 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 55, NO 1, JANUARY 2009 Parity Forwarding for Multiple-Relay Networks Peyman Razaghi, Student Member, IEEE, Wei Yu, Senior Member, IEEE Abstract This paper

More information

A Method of Identifying the P2P File Sharing

A Method of Identifying the P2P File Sharing IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.11, November 2010 111 A Method of Identifying the P2P File Sharing Jian-Bo Chen Department of Information & Telecommunications

More information

OVSF Code Tree Management for UMTS with Dynamic Resource Allocation and Class-Based QoS Provision

OVSF Code Tree Management for UMTS with Dynamic Resource Allocation and Class-Based QoS Provision OVSF Code Tree Management for UMTS with Dynamic Resource Allocation and Class-Based QoS Provision Huei-Wen Ferng, Jin-Hui Lin, Yuan-Cheng Lai, and Yung-Ching Chen Department of Computer Science and Information

More information

Understanding BitTorrent: An Experimental Perspective

Understanding BitTorrent: An Experimental Perspective Understanding BitTorrent: An Experimental Perspective Arnaud Legout, Guillaume Urvoy-Keller, Pietro Michiardi To cite this version: Arnaud Legout, Guillaume Urvoy-Keller, Pietro Michiardi. Understanding

More information

Chunk Scheduling Strategies In Peer to Peer System-A Review

Chunk Scheduling Strategies In Peer to Peer System-A Review Chunk Scheduling Strategies In Peer to Peer System-A Review Sanu C, Deepa S S Abstract Peer-to-peer ( P2P) s t r e a m i n g systems have become popular in recent years. Several peer- to-peer systems for

More information

Analysis of Peer-Assisted Video-on-Demand Systems with Scalable Video Streams

Analysis of Peer-Assisted Video-on-Demand Systems with Scalable Video Streams Analysis of Peer-Assisted Video-on-Demand Systems with Scalable Video Streams Kianoosh Mokhtarian School of Computing Science Simon Fraser University Surrey, BC, Canada Mohamed Hefeeda School of Computing

More information

P2P Streaming: a Study on the Use of Advertisements as Incentives

P2P Streaming: a Study on the Use of Advertisements as Incentives P2P Streaming: a Study on the Use of Advertisements as Incentives Bo-Chun Wang, Alix L.H. Chow, Leana Golubchik Department of Computer Science, University of Southern California Nokia Research Center,

More information

IN mobile ad-hoc networks, nodes communicate with others

IN mobile ad-hoc networks, nodes communicate with others IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 3, NO. 2, JUNE 2008 317 Secure Cooperation in Autonomous Mobile Ad-Hoc Networks Under Noise and Imperfect Monitoring: A Game-Theoretic Approach

More information

P2P Content Distribution

P2P Content Distribution , University of Hannover Wolf-Tilo Balke and Wolf Siberski 28.11.2007 *With slides from K. Wehrle (RWTH), A. Bharambe (CMU), P. Rodriguez, P. Chou (MSRC), Chiu (CUHK) Peer-to-Peer Systems and Applications,

More information

Flexible Servers in Understaffed Tandem Lines

Flexible Servers in Understaffed Tandem Lines Flexible Servers in Understaffed Tandem Lines Abstract We study the dynamic assignment of cross-trained servers to stations in understaffed lines with finite buffers. Our objective is to maximize the production

More information

Incentive for P2P Fair Resource Sharing

Incentive for P2P Fair Resource Sharing Incentive for P2P Fair Resource Sharing Emmanuelle Anceaume CNRS IRISA, France Joint work with Maria Gradinariu (IRISA), Aina Ravoaja (IRISA) Facing Rationality Classical distributed systems P2P Either

More information

An Approach to Connection Admission Control in Single-Hop Multiservice Wireless Networks With QoS Requirements

An Approach to Connection Admission Control in Single-Hop Multiservice Wireless Networks With QoS Requirements 1110 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 52, NO. 4, JULY 2003 An Approach to Connection Admission Control in Single-Hop Multiservice Wireless Networks With QoS Requirements Tara Javidi, Member,

More information